Preferred Language
Articles
/
yxZGpYsBVTCNdQwCgtWK
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear feedback shift-register(LFSR) is a widely used tool for generating cryptographic sequences like Galois, Fibonacci. In this paper authentication system is designed using the specified brain waves which are Gamma and Betta wave’s features in order to generate the user authenticated sequence using Galois LFSRs.

Scopus
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (50)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Immunoglobulins Levels and Complements in Patients with Brain Tumour (Meningioma and Glioma)
...Show More Authors

Objective(s): The present study aims at studying the relationship between immunoglobulin IgG, IgA,
IgM , as well as to C-3 and C-4 in brain tumours patients immunity (meningioms and gliomas).
Methodology: Forty sera of brain tumour patients were included 20 glioma and 20 meningioma was
tested to determine the levels of IgM, IgG IgA, C-3 and C-4 by using single radial immune-diffusion
technique and compared with 20 apparently healthy blood donors.
Results: The study revealed a significant decreasing in IgG levels in glioma as compare to meningioma
and control. The concentration of two other serum immunoglobulins and complement in both
meningioma and glioma show no significant differences with those in control group.

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Biotechnology
BIOCHEMICAL STUDY ON SUPEROXIDE DISMUTASE ENZYME IN PATIENTS WITH DIFFERENT BRAIN TUMORS
...Show More Authors

The aim of the current study is to in evaluate the role of SOD activity in the previously reported oxidative stress in our laboratory(1), in the patients with different brain tumors. SOD activity was assayed according to riboflavin/NBT method and its specific activity was calculated in patients with benign and malignant brain tumors and control. Moreover the specific activity was compared in these samples according to gender and the occurrence of disease.Non significant elevation (P > 0.05) in SOD specific activity was observed in tissue of malignant tumors in comparison to that of in benign brain tumors. While a highly significant decrease (P < 0.001) of the specific activity was found in sera of malignant patients group in comparison to t

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 26 2023
Journal Name
Farmacia
THE DEVELOPMENT OF A BRAIN TARGETED MUCOADHESIVE AMISULPRIDE LOADED NANOSTRUCTURED LIPID CARRIER
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 19 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
The use of still and animated comics in providing user services in university information institutions: a field study
...Show More Authors

Comics is a visual art (Still and motion pictures) it seeks to provide a Training courses are a series of intensive important educational and complementary programs, based on previous foundation experiences. Create to development the participants in aspects of specialization according to the requirements of the educational system to continue developing the previous scienti􀂡c and practical experiences. Personally, or adopted by the trainee institution, where the trainee gets a professional skill certi􀂡cate that contributes to the development his work.Development and Continuous Education Center (DCEC) at the University of Baghdad (UoBaghdad) is a center dedicated to continuing education courses in which the participant is awarded a cert

... Show More
Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Pleasure and Emotions and their role in aesthetics' experience of the user: صلاح نوري محمود، جاسم خزعل العقيلي
...Show More Authors

Industrial product is one of the things of daily use and direct interaction with the user, so the ranges of its association to the user, took a varied and multiple aspects. The user today sees the products as things have specifications related directly to the psychology of the user, so he can reflects his values, principles and ideas on the composition of the total structure of the product, making them a means by which manifested the internal entity's of the user took an external materiality. And then counting the products being things excite positive feelings among different user was a natural result given the complexity of the relationship between the user and the industrial product. So pleasure is one important effects that result fro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 13 2012
Journal Name
Wireless Personal Communications
Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique
...Show More Authors

View Publication
Scopus (17)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Dec 16 2024
Journal Name
Light & Engineering
The Design and Experimental Realization of a Laser-Based Heating System Using Recycled Laser Module
...Show More Authors

Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref